|
33 | 33 | |
34 | 34 | "_email": "[variables('email')]", |
35 | 35 | "_solutionName": "AbuseIPDB", |
36 | | - "_solutionVersion": "3.0.1", |
| 36 | + "_solutionVersion": "3.0.2", |
37 | 37 | "solutionId": "azuresentinel.azure-sentinel-solution-abuseipdb", |
38 | 38 | "_solutionId": "[variables('solutionId')]", |
39 | 39 | "AbuseIPDBAPIConnector": "AbuseIPDBAPIConnector", |
|
54 | 54 | "playbookId2": "[resourceId('Microsoft.Logic/workflows', variables('playbookContentId2'))]", |
55 | 55 | "playbookTemplateSpecName2": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-pl-',uniquestring(variables('_playbookContentId2'))))]", |
56 | 56 | "_playbookcontentProductId2": "[concat(take(variables('_solutionId'),50),'-','pl','-', uniqueString(concat(variables('_solutionId'),'-','Playbook','-',variables('_playbookContentId2'),'-', variables('playbookVersion2'))))]", |
57 | | - "AbuseIPDB-ReportaIPsToAbuselPDBAfterCheckingByUserInMSTeams": "AbuseIPDB-ReportaIPsToAbuselPDBAfterCheckingByUserInMSTeams", |
58 | | - "_AbuseIPDB-ReportaIPsToAbuselPDBAfterCheckingByUserInMSTeams": "[variables('AbuseIPDB-ReportaIPsToAbuselPDBAfterCheckingByUserInMSTeams')]", |
| 57 | + "AbuseIPDB-ReportIPsAfterUserResponseInMSTeams": "AbuseIPDB-ReportIPsAfterUserResponseInMSTeams", |
| 58 | + "_AbuseIPDB-ReportIPsAfterUserResponseInMSTeams": "[variables('AbuseIPDB-ReportIPsAfterUserResponseInMSTeams')]", |
59 | 59 | "playbookVersion3": "1.0", |
60 | | - "playbookContentId3": "AbuseIPDB-ReportaIPsToAbuselPDBAfterCheckingByUserInMSTeams", |
| 60 | + "playbookContentId3": "AbuseIPDB-ReportIPsAfterUserResponseInMSTeams", |
61 | 61 | "_playbookContentId3": "[variables('playbookContentId3')]", |
62 | 62 | "playbookId3": "[resourceId('Microsoft.Logic/workflows', variables('playbookContentId3'))]", |
63 | 63 | "playbookTemplateSpecName3": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-pl-',uniquestring(variables('_playbookContentId3'))))]", |
|
82 | 82 | "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" |
83 | 83 | ], |
84 | 84 | "properties": { |
85 | | - "description": "AbuseIPDBAPIConnector Playbook with template version 3.0.1", |
| 85 | + "description": "AbuseIPDBAPIConnector Playbook with template version 3.0.2", |
86 | 86 | "mainTemplate": { |
87 | 87 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", |
88 | 88 | "contentVersion": "[variables('playbookVersion1')]", |
|
640 | 640 | "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" |
641 | 641 | ], |
642 | 642 | "properties": { |
643 | | - "description": "AbuseIPDB-EnrichIncidentByIPInfo Playbook with template version 3.0.1", |
| 643 | + "description": "AbuseIPDB-EnrichIncidentByIPInfo Playbook with template version 3.0.2", |
644 | 644 | "mainTemplate": { |
645 | 645 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", |
646 | 646 | "contentVersion": "[variables('playbookVersion2')]", |
|
735 | 735 | "inputs": { |
736 | 736 | "name": "Result List", |
737 | 737 | "value": { |
738 | | - "abuseConfidenceScore": "@body('AuseIPDB_CHECK_Endpoint')?['data']?['abuseConfidenceScore']", |
739 | | - "hostnames": "@body('AuseIPDB_CHECK_Endpoint')?['data']?['hostnames']", |
740 | | - "ipAddress": "@body('AuseIPDB_CHECK_Endpoint')?['data']?['ipAddress']", |
741 | | - "ipVersion": "@body('AuseIPDB_CHECK_Endpoint')?['data']?['ipVersion']", |
742 | | - "isPublic": "@body('AuseIPDB_CHECK_Endpoint')?['data']?['isPublic']", |
743 | | - "isWhitelisted": "@body('AuseIPDB_CHECK_Endpoint')?['data']?['isWhitelisted']", |
744 | | - "isp": "@body('AuseIPDB_CHECK_Endpoint')?['data']?['isp']", |
745 | | - "lastReportedAt": "@body('AuseIPDB_CHECK_Endpoint')?['data']?['lastReportedAt']", |
746 | | - "numDistinctUsers": "@body('AuseIPDB_CHECK_Endpoint')?['data']?['numDistinctUsers']", |
747 | | - "totalReports": "@body('AuseIPDB_CHECK_Endpoint')?['data']?['totalReports']", |
748 | | - "usageType": "@body('AuseIPDB_CHECK_Endpoint')?['data']?['usageType']" |
| 738 | + "abuseConfidenceScore": "@body('AbuseIPDB_CHECK_Endpoint')?['data']?['abuseConfidenceScore']", |
| 739 | + "hostnames": "@body('AbuseIPDB_CHECK_Endpoint')?['data']?['hostnames']", |
| 740 | + "ipAddress": "@body('AbuseIPDB_CHECK_Endpoint')?['data']?['ipAddress']", |
| 741 | + "ipVersion": "@body('AbuseIPDB_CHECK_Endpoint')?['data']?['ipVersion']", |
| 742 | + "isPublic": "@body('AbuseIPDB_CHECK_Endpoint')?['data']?['isPublic']", |
| 743 | + "isWhitelisted": "@body('AbuseIPDB_CHECK_Endpoint')?['data']?['isWhitelisted']", |
| 744 | + "isp": "@body('AbuseIPDB_CHECK_Endpoint')?['data']?['isp']", |
| 745 | + "lastReportedAt": "@body('AbuseIPDB_CHECK_Endpoint')?['data']?['lastReportedAt']", |
| 746 | + "numDistinctUsers": "@body('AbuseIPDB_CHECK_Endpoint')?['data']?['numDistinctUsers']", |
| 747 | + "totalReports": "@body('AbuseIPDB_CHECK_Endpoint')?['data']?['totalReports']", |
| 748 | + "usageType": "@body('AbuseIPDB_CHECK_Endpoint')?['data']?['usageType']" |
749 | 749 | } |
750 | 750 | }, |
751 | 751 | "runAfter": { |
752 | | - "AuseIPDB_CHECK_Endpoint": [ |
| 752 | + "AbuseIPDB_CHECK_Endpoint": [ |
753 | 753 | "Succeeded" |
754 | 754 | ] |
755 | 755 | }, |
756 | 756 | "type": "AppendToArrayVariable" |
757 | 757 | }, |
758 | | - "AuseIPDB_CHECK_Endpoint": { |
| 758 | + "AbuseIPDB_CHECK_Endpoint": { |
759 | 759 | "inputs": { |
760 | 760 | "host": { |
761 | 761 | "connection": { |
|
814 | 814 | "type": "ApiConnection" |
815 | 815 | }, |
816 | 816 | "Get_Logo": { |
817 | | - "inputs": "<img src=\"https://www.abuseipdb.com/img/abuseipdb.png.pagespeed.ce.CI8T6WsXU7.png\" width=\"152\" height=\"32\"> ", |
| 817 | + "inputs": "<img src=\"https://www.abuseipdb.com/img/abuseipdb.png\" width=\"152\" height=\"32\"> ", |
818 | 818 | "runAfter": { |
819 | 819 | "Entities_-_Get_IPs": [ |
820 | 820 | "Succeeded" |
|
974 | 974 | "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" |
975 | 975 | ], |
976 | 976 | "properties": { |
977 | | - "description": "AbuseIPDB-ReportaIPsToAbuselPDBAfterCheckingByUserInMSTeams Playbook with template version 3.0.1", |
| 977 | + "description": "AbuseIPDB-ReportIPsAfterUserResponseInMSTeams Playbook with template version 3.0.2", |
978 | 978 | "mainTemplate": { |
979 | 979 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", |
980 | 980 | "contentVersion": "[variables('playbookVersion3')]", |
981 | 981 | "parameters": { |
982 | 982 | "PlaybookName": { |
983 | | - "defaultValue": "AbuseIPDB-ReportaIPsToAbuselPDBAfterCheckingByUserInMSTeams", |
984 | | - "type": "String" |
| 983 | + "defaultValue": "AbuseIPDB-ReportIPsAfterUserResponseInMSTeams", |
| 984 | + "type": "string" |
985 | 985 | }, |
986 | 986 | "customApis_AbuseIPDBAPI_name": { |
987 | 987 | "defaultValue": "AbuseIPDBAPI", |
|
992 | 992 | }, |
993 | 993 | "MSTeamsGroupId": { |
994 | 994 | "defaultValue": "<MSTeamsGroupId>", |
995 | | - "type": "String", |
| 995 | + "type": "string", |
996 | 996 | "metadata": { |
997 | | - "description": "Value of the MSTeamsGroupId parameter in the AbuseIPDB-ReportaIPsToAbuselPDBAfterCheckingByUserInMSTeams playbook. Id of the Teams Group where the adaptive card will be posted." |
| 997 | + "description": "Value of the MSTeamsGroupId parameter in the AbuseIPDB-ReportIPsAfterUserResponseInMSTeams playbook. Id of the Teams Group where the adaptive card will be posted." |
998 | 998 | } |
999 | 999 | }, |
1000 | 1000 | "MSTeamsChannelId": { |
1001 | 1001 | "defaultValue": "<MSTeamsChannelId>", |
1002 | | - "type": "String", |
| 1002 | + "type": "string", |
1003 | 1003 | "metadata": { |
1004 | | - "description": "Value of the MSTeamsChannelId parameter in the AbuseIPDB-ReportaIPsToAbuselPDBAfterCheckingByUserInMSTeams playbook. Id of the Teams Channel where the adaptive card will be posted." |
| 1004 | + "description": "Value of the MSTeamsChannelId parameter in the AbuseIPDB-ReportIPsAfterUserResponseInMSTeams playbook. Id of the Teams Channel where the adaptive card will be posted." |
1005 | 1005 | } |
1006 | 1006 | } |
1007 | 1007 | }, |
|
1340 | 1340 | "type": "Foreach" |
1341 | 1341 | }, |
1342 | 1342 | "Get_Logo": { |
1343 | | - "inputs": "<img src=\"https://www.abuseipdb.com/img/abuseipdb.png.pagespeed.ce.CI8T6WsXU7.png\" width=\"152\" height=\"32\"> ", |
| 1343 | + "inputs": "<img src=\"https://www.abuseipdb.com/img/abuseipdb.png\" width=\"152\" height=\"32\"> ", |
1344 | 1344 | "runAfter": { |
1345 | 1345 | "Entities_-_Get_IPs": [ |
1346 | 1346 | "Succeeded" |
|
1469 | 1469 | } |
1470 | 1470 | ], |
1471 | 1471 | "metadata": { |
1472 | | - "title": " AbuseIPDB Report a IPs To AbuselPDB After Checking By User In MSTeams", |
| 1472 | + "title": "AbuseIPDB Report IPs To AbuseIPDB After User Response In MSTeams", |
1473 | 1473 | "description": "When a new sentinel incident is created, this playbook gets triggered and performs the following actions:\n 1. Sends an adaptive card to the Teams channel where the analyst can choose an action to be taken.", |
1474 | 1474 | "prerequisites": [ |
1475 | 1475 | "1. Prior to the deployment of this playbook, AbuseIPDB Connector needs to be deployed under the same subscription.", |
|
1495 | 1495 | "releaseNotes": [ |
1496 | 1496 | { |
1497 | 1497 | "version": "1.0.0", |
1498 | | - "title": "AbuseIPDB Report a IPs To AbuselPDB After Checking By User In MSTeams", |
| 1498 | + "title": "AbuseIPDB Report IPs To AbuseIPDB After User Response In MSTeams", |
1499 | 1499 | "notes": [ |
1500 | 1500 | "Initial version" |
1501 | 1501 | ] |
|
1510 | 1510 | "contentSchemaVersion": "3.0.0", |
1511 | 1511 | "contentId": "[variables('_playbookContentId3')]", |
1512 | 1512 | "contentKind": "Playbook", |
1513 | | - "displayName": "AbuseIPDB-ReportaIPsToAbuselPDBAfterCheckingByUserInMSTeams", |
| 1513 | + "displayName": "AbuseIPDB-ReportIPsAfterUserResponseInMSTeams", |
1514 | 1514 | "contentProductId": "[variables('_playbookcontentProductId3')]", |
1515 | 1515 | "id": "[variables('_playbookcontentProductId3')]", |
1516 | 1516 | "version": "[variables('playbookVersion3')]" |
|
1525 | 1525 | "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" |
1526 | 1526 | ], |
1527 | 1527 | "properties": { |
1528 | | - "description": "AbuseIPDB-BlacklistIpToThreatIntelligence Playbook with template version 3.0.1", |
| 1528 | + "description": "AbuseIPDB-BlacklistIpToThreatIntelligence Playbook with template version 3.0.2", |
1529 | 1529 | "mainTemplate": { |
1530 | 1530 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", |
1531 | 1531 | "contentVersion": "[variables('playbookVersion4')]", |
|
1830 | 1830 | "prerequisites": [ |
1831 | 1831 | "1. AbuseIPDBAPI Custom Connector has to be deployed prior to the deployment of this playbook under the same subscription.", |
1832 | 1832 | "2. To use the Microsoft Graph Security connector actions, Microsoft Entra ID tenant administrator consent needs to be provided. The Microsoft Graph Security connector application ID and name for Microsoft Entra ID follows for Microsoft Entra ID administrator consent:\n- Application Name - MicrosoftGraphSecurityConnector\n- Application ID - c4829704-0edc-4c3d-a347-7c4a67586f3c", |
1833 | | - |
1834 | | - "3. To view the Threat Indicators submitted by Microsoft Graph Security connector, 'Threat Intelligence Platforms' connector from 'Threat Intelligence' Solution need to be install." |
| 1833 | + "3. To view the Threat Indicators submitted by Microsoft Graph Security connector, 'Threat Intelligence Platforms' connector from 'Threat Intelligence' Solution need to be install." |
1835 | 1834 | ], |
1836 | 1835 | "preDeployment": [ |
1837 | 1836 | "1. AbuseIPDB Custom Connector has to be deployed prior to the deployment of this playbook under the same subscription." |
|
1881 | 1880 | "apiVersion": "2023-04-01-preview", |
1882 | 1881 | "location": "[parameters('workspace-location')]", |
1883 | 1882 | "properties": { |
1884 | | - "version": "3.0.1", |
| 1883 | + "version": "3.0.2", |
1885 | 1884 | "kind": "Solution", |
1886 | 1885 | "contentSchemaVersion": "3.0.0", |
1887 | 1886 | "displayName": "AbuseIPDB", |
|
1923 | 1922 | }, |
1924 | 1923 | { |
1925 | 1924 | "kind": "Playbook", |
1926 | | - "contentId": "[variables('_AbuseIPDB-ReportaIPsToAbuselPDBAfterCheckingByUserInMSTeams')]", |
| 1925 | + "contentId": "[variables('_AbuseIPDB-ReportIPsAfterUserResponseInMSTeams')]", |
1927 | 1926 | "version": "[variables('playbookVersion3')]" |
1928 | 1927 | }, |
1929 | 1928 | { |
|
0 commit comments